Patch  oval:com.redhat.rhsa:def:20081044
RHSA-2008:1044: java-1.5.0-bea security update (Important)  

The BEA WebLogic JRockit JRE and SDK contains BEA WebLogic JRockit Virtual Machine and is certified for the Java™ 2 Platform, Standard Edition, v1.5.0.
The java-1.5.0-bea packages are vulnerable to important security flaws and should no longer be used.
A flaw was found in the Java Management Extensions (JMX) management agent. When local monitoring was enabled, remote attackers could use this flaw to perform illegal operations. (CVE-2008-3103)
Several flaws involving the handling of unsigned applets were found. A remote attacker could misuse an unsigned applet in order to connect to services on the host running the applet. (CVE-2008-3104)
Several flaws in the Java API for XML Web Services (JAX-WS) client and the JAX-WS service implementation were found. A remote attacker who could cause malicious XML to be processed by an application could access URLs, or cause a denial of service. (CVE-2008-3105, CVE-2008-3106)
A buffer overflow vulnerability was found in the font processing code. This allowed remote attackers to extend the permissions of an untrusted applet or application, allowing it to read or write local files, as well as to execute local applications accessible to the user running the untrusted application. (CVE-2008-3108)
The vulnerabilities concerning applets listed above can only be triggered in java-1.5.0-bea, by calling the "appletviewer" application.
BEA was acquired by Oracle® during 2008 (the acquisition was completed on April 29, 2008). Consequently, JRockit is now an Oracle offering and these issues are addressed in the current release of Oracle JRockit. Due to a license change by Oracle, however, Red Hat is unable to ship Oracle JRockit.
Users who wish to continue using JRockit should get an update directly from Oracle: http://oracle.com/technology/software/products/jrockit/.
Alternatives to Oracle JRockit include the Java 2 Technology Edition of the IBM® Developer Kit for Linux and the Sun™ Java SE Development Kit (JDK), both of which are available on the Extras or Supplementary channels. For Java 6 users, the new OpenJDK open source JDK will be included in Red Hat Enterprise Linux 5.3 and will be supported by Red Hat.
This update removes the java-1.5.0-bea packages due to their known security vulnerabilities.
Create Date: 2008-12-18 Last Update Date: 2008-12-18

Affected Platforms/Products

Affected Products (CPE + CVE references)
  • cpe:/a:redhat:rhel_extras:4
  • cpe:/a:redhat:rhel_extras:5
Platforms: unix (from OVAL definitions)
  • Supplementary for Red Hat Enterprise Linux 5

References

Criteria

The patch should be installed
IF : All of the following are true
IF : Red Hat Enterprise Linux 5 is installed
Linux : RPM Test :  Red Hat Enterprise Linux 5 is installed 
At least one of the objects listed below must exist on the system (Existence check)
Unknown object oval:com.redhat.rhsa:obj:20030315001 (Object depth limit may be exceeded) !!!
version pattern match ^5[^\d]
linux : rpminfo_state 
IF : Any one of the following are true
IF : All of the following are true
IF : java-1.5.0-bea-uninstall is signed with Red Hat redhatrelease key
Linux : RPM Test :  java-1.5.0-bea-uninstall is signed with Red Hat redhatrelease key 
At least one of the objects listed below must exist on the system (Existence check)
Unknown object oval:com.redhat.rhsa:obj:20081044003 (Object depth limit may be exceeded) !!!
signature_keyid equals 5326810137017186
linux : rpminfo_state 
IF : java-1.5.0-bea-uninstall is earlier than 0:1.5.0.14-1jpp.5.el5
Linux : RPM Test :  java-1.5.0-bea-uninstall is earlier than 0:1.5.0.14-1jpp.5.el5 
At least one of the objects listed below must exist on the system (Existence check)
Unknown object oval:com.redhat.rhsa:obj:20081044003 (Object depth limit may be exceeded) !!!
RPM Version less than 0:1.5.0.14-1jpp.5.el5 (datatype=evr_string)
linux : rpminfo_state 
IF : All of the following are true
IF : java-1.5.0-bea is signed with Red Hat redhatrelease key
Linux : RPM Test :  java-1.5.0-bea is signed with Red Hat redhatrelease key 
At least one of the objects listed below must exist on the system (Existence check)
Unknown object oval:com.redhat.rhsa:obj:20070956002 (Object depth limit may be exceeded) !!!
signature_keyid equals 5326810137017186
linux : rpminfo_state 
IF : java-1.5.0-bea is earlier than 0:1.5.0.14-1jpp.5.el5
Linux : RPM Test :  java-1.5.0-bea is earlier than 0:1.5.0.14-1jpp.5.el5 
At least one of the objects listed below must exist on the system (Existence check)
Unknown object oval:com.redhat.rhsa:obj:20070956002 (Object depth limit may be exceeded) !!!
RPM Version less than 0:1.5.0.14-1jpp.5.el5 (datatype=evr_string)
linux : rpminfo_state 

Quick Help

evr_string datatype
Represents epoch, version, and release number as a single version string
Other Help Topics
Data Types
What is an Object?
What is a State?
What is a Test?
Other Help Topics
Regular Expression Patterns
Some object or state definitions are defined as regular expression patterns, you should interpret the regexp pattern while evaluating them.

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html